Skip to main content

Multiple Images Defending Process by Leaning Techniques

  • Conference paper
  • First Online:
Smart Computing and Informatics

Abstract

Providing security to data in the form of text is cryptography, but visual cryptography provides defense for visual images. In this, we intended a mechanism to encipher an image into different levels, i.e., intensity variation, pixel swapping, steganography, and randomization, which seizes network as a means to attain the actual receiver who does the retrieval procedure in reverse order. Different methods are developed, namely intensity variation on each and every pixel of an image and color pixel value swapping within an image, calculating the pixel intensity values and embedding them using steganography, and randomization process. Instead of using external images for manipulation, it provides a better encryption process. Multiple images can be used, which is a good parameter of the proposed procedure. Hence, multiple images can be transformed at a time and more security can be achieved by this proposed method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Gnanaguruparan, M., Kak, S.: Recursive hiding of secrets in visual cryptography. Cryptologia 26, 68–76 (2002)

    Article  Google Scholar 

  2. Verheul, E.R., van Tilborg, H.C.A.: Constructions and properties of k out of n visual secret sharing schemes. Des. Codes Cryptogr. 11(2), 179–196 (1997)

    Article  MathSciNet  Google Scholar 

  3. Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250, 143–161 (2001)

    Article  MathSciNet  Google Scholar 

  4. Anitha, R., Sasirekha, N.: Image securing mechanism by gradient techniques. Int. J. Comput. Eng. Appl. VIII(I), 55–64 (2014)

    Google Scholar 

  5. Naor, M., Shamir, A.: Visual cryptography. In: Advances in Cryptology EUROCRYPT ”94. Lecture Notes in Computer Science

    Google Scholar 

  6. Koppu, S., Madhu Viswanatham, V.: A survey on security issues: digital images. Int. J. Pharm. Technol. 8(2),13420–13427 (2016)

    Google Scholar 

  7. Addin Ahmed Salem Al-Maweri, N.: State-of-the-art in techniques of text digital watermarking: challenges and limitations. Int. J. Comput. Sci. 12(2) (2016)

    Google Scholar 

  8. Liu, F.: Improving the visual quality of size invariant visual cryptography scheme. J. Vis. Commun. Image Represent. 23(2), 331–342 (2012)

    Article  Google Scholar 

  9. Yu, J., Li, F., Cheng, H., Zhang, X.: Spatial steganalysis using contrast of residuals. IEEE Signal Process. Lett. 23(7), 989–992 (2016)

    Article  Google Scholar 

  10. Sah, H.R., Gunasekaran, G.: Privacy preserving data mining using image slicing and visual cryptography. In: IEEE Transactions, pp. 1–7 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yerininti Venkata Narayana .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Narayana, Y.V., Prashant, A., Prasad, D.V., Kumar, C.S.P. (2018). Multiple Images Defending Process by Leaning Techniques. In: Satapathy, S., Bhateja, V., Das, S. (eds) Smart Computing and Informatics . Smart Innovation, Systems and Technologies, vol 77. Springer, Singapore. https://doi.org/10.1007/978-981-10-5544-7_10

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-5544-7_10

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-5543-0

  • Online ISBN: 978-981-10-5544-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics